xref: /freebsd/crypto/openssl/ssl/quic/quic_channel_local.h (revision e7be843b4a162e68651d3911f0357ed464915629)
1 #ifndef OSSL_QUIC_CHANNEL_LOCAL_H
2 # define OSSL_QUIC_CHANNEL_LOCAL_H
3 
4 # include "internal/quic_channel.h"
5 
6 # ifndef OPENSSL_NO_QUIC
7 
8 #  include <openssl/lhash.h>
9 #  include "internal/list.h"
10 #  include "internal/quic_predef.h"
11 #  include "internal/quic_fc.h"
12 #  include "internal/quic_stream_map.h"
13 #  include "internal/quic_tls.h"
14 
15 /*
16  * QUIC Channel Structure
17  * ======================
18  *
19  * QUIC channel internals. It is intended that only the QUIC_CHANNEL
20  * implementation and the RX depacketiser be allowed to access this structure
21  * directly. As the RX depacketiser has no state of its own and computes over a
22  * QUIC_CHANNEL structure, it can be viewed as an extension of the QUIC_CHANNEL
23  * implementation. While the RX depacketiser could be provided with adequate
24  * accessors to do what it needs, this would weaken the abstraction provided by
25  * the QUIC_CHANNEL to other components; moreover the coupling of the RX
26  * depacketiser to QUIC_CHANNEL internals is too deep and bespoke to make this
27  * desirable.
28  *
29  * Other components should not include this header.
30  */
31 struct quic_channel_st {
32     QUIC_PORT                       *port;
33 
34     /*
35      * QUIC_PORT keeps the channels which belong to it on a list for bookkeeping
36      * purposes.
37      */
38     OSSL_LIST_MEMBER(ch,            QUIC_CHANNEL);
39     OSSL_LIST_MEMBER(incoming_ch,   QUIC_CHANNEL);
40 
41     /*
42      * The associated TLS 1.3 connection data. Used to provide the handshake
43      * layer; its 'network' side is plugged into the crypto stream for each EL
44      * (other than the 0-RTT EL). Note that the `tls` SSL object is not "owned"
45      * by this channel. It is created and managed elsewhere and is guaranteed
46      * to be valid for the lifetime of the channel. Therefore we do not free it
47      * when we free the channel.
48      */
49     QUIC_TLS                        *qtls;
50     SSL                             *tls;
51 
52     /* Port LCIDM we use to register LCIDs. */
53     QUIC_LCIDM                      *lcidm;
54     /* SRTM we register SRTs with. */
55     QUIC_SRTM                       *srtm;
56 
57     /* Optional QLOG instance (or NULL). */
58     QLOG                            *qlog;
59 
60     /*
61      * The transport parameter block we will send or have sent.
62      * Freed after sending or when connection is freed.
63      */
64     unsigned char                   *local_transport_params;
65 
66     /*
67      * Pending new token to send once handshake is complete
68      */
69     uint8_t                         *pending_new_token;
70     size_t                          pending_new_token_len;
71 
72     /* Our current L4 peer address, if any. */
73     BIO_ADDR                        cur_peer_addr;
74 
75     /*
76      * Subcomponents of the connection. All of these components are instantiated
77      * and owned by us.
78      */
79     OSSL_QUIC_TX_PACKETISER         *txp;
80     QUIC_TXPIM                      *txpim;
81     QUIC_CFQ                        *cfq;
82     /*
83      * Connection level FC. The stream_count RXFCs is used to manage
84      * MAX_STREAMS signalling.
85      */
86     QUIC_TXFC                       conn_txfc;
87     QUIC_RXFC                       conn_rxfc, crypto_rxfc[QUIC_PN_SPACE_NUM];
88     QUIC_RXFC                       max_streams_bidi_rxfc, max_streams_uni_rxfc;
89     QUIC_STREAM_MAP                 qsm;
90     OSSL_STATM                      statm;
91     OSSL_CC_DATA                    *cc_data;
92     const OSSL_CC_METHOD            *cc_method;
93     OSSL_ACKM                       *ackm;
94 
95     /* Record layers in the TX and RX directions. */
96     OSSL_QTX                        *qtx;
97     OSSL_QRX                        *qrx;
98 
99     /* Message callback related arguments */
100     ossl_msg_cb                     msg_callback;
101     void                            *msg_callback_arg;
102     SSL                             *msg_callback_ssl;
103 
104     /*
105      * Send and receive parts of the crypto streams.
106      * crypto_send[QUIC_PN_SPACE_APP] is the 1-RTT crypto stream. There is no
107      * 0-RTT crypto stream.
108      */
109     QUIC_SSTREAM                    *crypto_send[QUIC_PN_SPACE_NUM];
110     QUIC_RSTREAM                    *crypto_recv[QUIC_PN_SPACE_NUM];
111 
112     /* Internal state. */
113     /*
114      * Client: The DCID used in the first Initial packet we transmit as a client.
115      * Server: The DCID used in the first Initial packet the client transmitted.
116      * Randomly generated and required by RFC to be at least 8 bytes.
117      */
118     QUIC_CONN_ID                    init_dcid;
119 
120     /*
121      * Server: If this channel is created in response to an init packet sent
122      * after the server has sent a retry packet to do address validation, this
123      * field stores the original connection id from the first init packet sent
124      */
125     QUIC_CONN_ID                    odcid;
126 
127     /*
128      * Client: The SCID found in the first Initial packet from the server.
129      * Not valid for servers.
130      * Valid if have_received_enc_pkt is set.
131      */
132     QUIC_CONN_ID                    init_scid;
133 
134     /*
135      * Client only: The SCID found in an incoming Retry packet we handled.
136      * Not valid for servers.
137      */
138     QUIC_CONN_ID                    retry_scid;
139 
140     /* Server only: The DCID we currently expect the peer to use to talk to us. */
141     QUIC_CONN_ID                    cur_local_cid;
142 
143     /*
144      * The DCID we currently use to talk to the peer and its sequence num.
145      */
146     QUIC_CONN_ID                    cur_remote_dcid;
147     uint64_t                        cur_remote_seq_num;
148     uint64_t                        cur_retire_prior_to;
149 
150     /* Transport parameter values we send to our peer. */
151     uint64_t                        tx_init_max_stream_data_bidi_local;
152     uint64_t                        tx_init_max_stream_data_bidi_remote;
153     uint64_t                        tx_init_max_stream_data_uni;
154     uint64_t                        tx_max_ack_delay; /* ms */
155 
156     /* Transport parameter values received from server. */
157     uint64_t                        rx_init_max_stream_data_bidi_local;
158     uint64_t                        rx_init_max_stream_data_bidi_remote;
159     uint64_t                        rx_init_max_stream_data_uni;
160     uint64_t                        rx_max_ack_delay; /* ms */
161     unsigned char                   rx_ack_delay_exp;
162 
163     /* Diagnostic counters for testing purposes only. May roll over. */
164     uint16_t                        diag_num_rx_ack; /* Number of ACK frames received */
165 
166     /*
167      * Temporary staging area to store information about the incoming packet we
168      * are currently processing.
169      */
170     OSSL_QRX_PKT                    *qrx_pkt;
171 
172     /*
173      * Current limit on number of streams we may create. Set by transport
174      * parameters initially and then by MAX_STREAMS frames.
175      */
176     uint64_t                        max_local_streams_bidi;
177     uint64_t                        max_local_streams_uni;
178 
179     /* The idle timeout values we and our peer requested. */
180     uint64_t                        max_idle_timeout_local_req;
181     uint64_t                        max_idle_timeout_remote_req;
182 
183     /* The negotiated maximum idle timeout in milliseconds. */
184     uint64_t                        max_idle_timeout;
185 
186     /*
187      * Maximum payload size in bytes for datagrams sent to our peer, as
188      * negotiated by transport parameters.
189      */
190     uint64_t                        rx_max_udp_payload_size;
191     /* Maximum active CID limit, as negotiated by transport parameters. */
192     uint64_t                        rx_active_conn_id_limit;
193 
194     /*
195      * Used to allocate stream IDs. This is a stream ordinal, i.e., a stream ID
196      * without the low two bits designating type and initiator. Shift and or in
197      * the type bits to convert to a stream ID.
198      */
199     uint64_t                        next_local_stream_ordinal_bidi;
200     uint64_t                        next_local_stream_ordinal_uni;
201 
202     /*
203      * Used to track which stream ordinals within a given stream type have been
204      * used by the remote peer. This is an optimisation used to determine
205      * which streams should be implicitly created due to usage of a higher
206      * stream ordinal.
207      */
208     uint64_t                        next_remote_stream_ordinal_bidi;
209     uint64_t                        next_remote_stream_ordinal_uni;
210 
211     /*
212      * Application error code to be used for STOP_SENDING/RESET_STREAM frames
213      * used to autoreject incoming streams.
214      */
215     uint64_t                        incoming_stream_auto_reject_aec;
216 
217     /*
218      * Override packet count threshold at which we do a spontaneous TXKU.
219      * Usually UINT64_MAX in which case a suitable value is chosen based on AEAD
220      * limit advice from the QRL utility functions. This is intended for testing
221      * use only. Usually set to UINT64_MAX.
222      */
223     uint64_t                        txku_threshold_override;
224 
225     /* Valid if we are in the TERMINATING or TERMINATED states. */
226     QUIC_TERMINATE_CAUSE            terminate_cause;
227 
228     /*
229      * Deadline at which we move to TERMINATING state. Valid if in the
230      * TERMINATING state.
231      */
232     OSSL_TIME                       terminate_deadline;
233 
234     /*
235      * Deadline at which connection dies due to idle timeout if no further
236      * events occur.
237      */
238     OSSL_TIME                       idle_deadline;
239 
240     /*
241      * Deadline at which we should send an ACK-eliciting packet to ensure
242      * idle timeout does not occur.
243      */
244     OSSL_TIME                       ping_deadline;
245 
246     /*
247      * The deadline at which the period in which it is RECOMMENDED that we not
248      * initiate any spontaneous TXKU ends. This is zero if no such deadline
249      * applies.
250      */
251     OSSL_TIME                       txku_cooldown_deadline;
252 
253     /*
254      * The deadline at which we take the QRX out of UPDATING and back to NORMAL.
255      * Valid if rxku_in_progress in 1.
256      */
257     OSSL_TIME                       rxku_update_end_deadline;
258 
259     /*
260      * The first (application space) PN sent with a new key phase. Valid if the
261      * QTX key epoch is greater than 0. Once a packet we sent with a PN p (p >=
262      * txku_pn) is ACKed, the TXKU is considered completed and txku_in_progress
263      * becomes 0. For sanity's sake, such a PN p should also be <= the highest
264      * PN we have ever sent, of course.
265      */
266     QUIC_PN                         txku_pn;
267 
268     /*
269      * The (application space) PN which triggered RXKU detection. Valid if
270      * rxku_pending_confirm.
271      */
272     QUIC_PN                         rxku_trigger_pn;
273 
274     /*
275      * State tracking. QUIC connection-level state is best represented based on
276      * whether various things have happened yet or not, rather than as an
277      * explicit FSM. We do have a coarse state variable which tracks the basic
278      * state of the connection's lifecycle, but more fine-grained conditions of
279      * the Active state are tracked via flags below. For more details, see
280      * doc/designs/quic-design/connection-state-machine.md. We are in the Open
281      * state if the state is QUIC_CHANNEL_STATE_ACTIVE and handshake_confirmed is
282      * set.
283      */
284     unsigned int                    state                   : 3;
285 
286     /*
287      * Have we received at least one encrypted packet from the peer?
288      * (If so, Retry and Version Negotiation messages should no longer
289      *  be received and should be ignored if they do occur.)
290      */
291     unsigned int                    have_received_enc_pkt   : 1;
292 
293     /*
294      * Have we successfully processed any packet, including a Version
295      * Negotiation packet? If so, further Version Negotiation packets should be
296      * ignored.
297      */
298     unsigned int                    have_processed_any_pkt  : 1;
299 
300     /*
301      * Have we sent literally any packet yet? If not, there is no point polling
302      * RX.
303      */
304     unsigned int                    have_sent_any_pkt       : 1;
305 
306     /*
307      * Are we currently doing proactive version negotiation?
308      */
309     unsigned int                    doing_proactive_ver_neg : 1;
310 
311     /* We have received transport parameters from the peer. */
312     unsigned int                    got_remote_transport_params    : 1;
313     /* We have generated our local transport parameters. */
314     unsigned int                    got_local_transport_params     : 1;
315 
316     /*
317      * This monotonically transitions to 1 once the TLS state machine is
318      * 'complete', meaning that it has both sent a Finished and successfully
319      * verified the peer's Finished (see RFC 9001 s. 4.1.1). Note that it
320      * does not transition to 1 at both peers simultaneously.
321      *
322      * Handshake completion is not the same as handshake confirmation (see
323      * below).
324      */
325     unsigned int                    handshake_complete      : 1;
326 
327     /*
328      * This monotonically transitions to 1 once the handshake is confirmed.
329      * This happens on the client when we receive a HANDSHAKE_DONE frame.
330      * At our option, we may also take acknowledgement of any 1-RTT packet
331      * we sent as a handshake confirmation.
332      */
333     unsigned int                    handshake_confirmed     : 1;
334 
335     /*
336      * We are sending Initial packets based on a Retry. This means we definitely
337      * should not receive another Retry, and if we do it is an error.
338      */
339     unsigned int                    doing_retry             : 1;
340 
341     /*
342      * We don't store the current EL here; the TXP asks the QTX which ELs
343      * are provisioned to determine which ELs to use.
344      */
345 
346     /* Have statm, qsm been initialised? Used to track cleanup. */
347     unsigned int                    have_statm              : 1;
348     unsigned int                    have_qsm                : 1;
349 
350     /*
351      * Preferred ELs for transmission and reception. This is not strictly needed
352      * as it can be inferred from what keys we have provisioned, but makes
353      * determining the current EL simpler and faster. A separate EL for
354      * transmission and reception is not strictly necessary but makes things
355      * easier for interoperation with the handshake layer, which likes to invoke
356      * the yield secret callback at different times for TX and RX.
357      */
358     unsigned int                    tx_enc_level            : 3;
359     unsigned int                    rx_enc_level            : 3;
360 
361     /* If bit n is set, EL n has been discarded. */
362     unsigned int                    el_discarded            : 4;
363 
364     /*
365      * While in TERMINATING - CLOSING, set when we should generate a connection
366      * close frame.
367      */
368     unsigned int                    conn_close_queued       : 1;
369 
370     /* Are we in server mode? Never changes after instantiation. */
371     unsigned int                    is_server               : 1;
372 
373     /*
374      * Set temporarily when the handshake layer has given us a new RX secret.
375      * Used to determine if we need to check our RX queues again.
376      */
377     unsigned int                    have_new_rx_secret      : 1;
378 
379     /* Have we ever called QUIC_TLS yet during RX processing? */
380     unsigned int                    did_tls_tick            : 1;
381     /* Has any CRYPTO frame been processed during this tick? */
382     unsigned int                    did_crypto_frame        : 1;
383 
384     /*
385      * Have we sent an ack-eliciting packet since the last successful packet
386      * reception? Used to determine when to bump idle timer (see RFC 9000 s.
387      * 10.1).
388      */
389     unsigned int                    have_sent_ack_eliciting_since_rx    : 1;
390 
391     /* Should incoming streams automatically be rejected? */
392     unsigned int                    incoming_stream_auto_reject         : 1;
393 
394     /*
395      * 1 if a key update sequence was locally initiated, meaning we sent the
396      * TXKU first and the resultant RXKU shouldn't result in our triggering
397      * another TXKU. 0 if a key update sequence was initiated by the peer,
398      * meaning we detect a RXKU first and have to generate a TXKU in response.
399      */
400     unsigned int                    ku_locally_initiated                : 1;
401 
402     /*
403      * 1 if we have triggered TXKU (whether spontaneous or solicited) but are
404      * waiting for any PN using that new KP to be ACKed. While this is set, we
405      * are not allowed to trigger spontaneous TXKU (but solicited TXKU is
406      * potentially still possible).
407      */
408     unsigned int                    txku_in_progress                    : 1;
409 
410     /*
411      * We have received an RXKU event and currently are going through
412      * UPDATING/COOLDOWN on the QRX. COOLDOWN is currently not used. Since RXKU
413      * cannot be detected in this state, this doesn't cause a protocol error or
414      * anything similar if a peer tries TXKU in this state. That traffic would
415      * simply be dropped. It's only used to track that our UPDATING timer is
416      * active so we know when to take the QRX out of UPDATING and back to
417      * NORMAL.
418      */
419     unsigned int                    rxku_in_progress                    : 1;
420 
421     /*
422      * We have received an RXKU but have yet to send an ACK for it, which means
423      * no further RXKUs are allowed yet. Note that we cannot detect further
424      * RXKUs anyway while the QRX remains in the UPDATING/COOLDOWN states, so
425      * this restriction comes into play if we take more than PTO time to send
426      * an ACK for it (not likely).
427      */
428     unsigned int                    rxku_pending_confirm                : 1;
429 
430     /* Temporary variable indicating rxku_pending_confirm is to become 0. */
431     unsigned int                    rxku_pending_confirm_done           : 1;
432 
433     /*
434      * If set, RXKU is expected (because we initiated a spontaneous TXKU).
435      */
436     unsigned int                    rxku_expected                       : 1;
437 
438     /* Permanent net error encountered */
439     unsigned int                    net_error                           : 1;
440 
441     /*
442      * Protocol error encountered. Note that you should refer to the state field
443      * rather than this. This is only used so we can ignore protocol errors
444      * after the first protocol error, but still record the first protocol error
445      * if it happens during the TERMINATING state.
446      */
447     unsigned int                    protocol_error                      : 1;
448 
449     /* Are we using addressed mode? */
450     unsigned int                    addressed_mode                      : 1;
451 
452     /* Are we on the QUIC_PORT linked list of channels? */
453     unsigned int                    on_port_list                        : 1;
454 
455     /* Has qlog been requested? */
456     unsigned int                    use_qlog                            : 1;
457 
458     /* Has qlog been requested? */
459     unsigned int                    is_tserver_ch                       : 1;
460 
461     /* Saved error stack in case permanent error was encountered */
462     ERR_STATE                       *err_state;
463 
464     /* Scratch area for use by RXDP to store decoded ACK ranges. */
465     OSSL_QUIC_ACK_RANGE             *ack_range_scratch;
466     size_t                          num_ack_range_scratch;
467 
468     /* Title for qlog purposes. We own this copy. */
469     char                            *qlog_title;
470 };
471 
472 # endif
473 
474 #endif
475